http://dropsafe.crypticide.com/article/3343#comment-23746
The way Tynt works is fairly simple. They attach a listener to the browser’s copy event that creates a hidden div with your selected text + two line breaks + attribution + sponsorship and they select the new text using either setBaseAndExtent for Safari, selectNodeContents and addRange for FF/Opera, or moveToElementText and select for IE. The browser copies the new hijacked selection to your clipboard. The script then reselects the range of text you had selected originally to make it look as if nothing is going on behind the scenes — using Tamper Data or Firebug’s Net panel will easily tell another story though, as you’ll notice requests going out whenever you Ctrl+C.
Monday, July 26, 2010
Subscribe to:
Post Comments (Atom)
#RSFtalks with Edward Snowden
What an intelligent, thoughtful individual. I find it difficult to forgive 44 for failing to pardon this patriot and instead pursuing him ...
Other Popular Posts:
-
The TP-Link Archer AC1750 C7 runs OpenWRT and is a great router IMHO. You can also try the same hardware, rebranded by Amazon as the A7: ...
-
[original post written in 2011, see below for Updates] Click image to zoom in. Here's a diagram of how I configure my Mac to locally r...
-
http://stackoverflow.com/questions/5171354/android-adb-shell-am-broadcast-bad-component-name adb shell am broadcast -a android.intent.act...
No comments:
Post a Comment